Description

A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain access to an affected system as a user who has the netadmin role. The vulnerability is due to improper authentication for requests that are sent to the API. An attacker could exploit this vulnerability by sending a crafted request to the API of an affected system. A successful exploit could allow the attacker to execute commands with the privileges of the netadmin role. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability. 

INFO

Published Date :

2026-02-25T16:14:09.046Z

Last Modified :

2026-03-20T21:47:59.021Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2026-20129 vulnerability.

Vendors Products
Cisco
  • Catalyst Sd-wan Manager
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-20129.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact